EP3251287B1 - Methods and arrangements for alert message detection in low latency systems - Google Patents
Methods and arrangements for alert message detection in low latency systems Download PDFInfo
- Publication number
- EP3251287B1 EP3251287B1 EP15704968.5A EP15704968A EP3251287B1 EP 3251287 B1 EP3251287 B1 EP 3251287B1 EP 15704968 A EP15704968 A EP 15704968A EP 3251287 B1 EP3251287 B1 EP 3251287B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- message
- radio
- network node
- detection
- messages
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000001514 detection method Methods 0.000 title claims description 64
- 238000000034 method Methods 0.000 title claims description 59
- 238000004891 communication Methods 0.000 claims description 21
- 238000012544 monitoring process Methods 0.000 claims description 14
- 238000012545 processing Methods 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 12
- 230000004044 response Effects 0.000 claims description 11
- 238000001228 spectrum Methods 0.000 claims description 7
- 230000035945 sensitivity Effects 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 description 7
- 230000001960 triggered effect Effects 0.000 description 6
- 238000013459 approach Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 239000000779 smoke Substances 0.000 description 4
- 230000003247 decreasing effect Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 239000007787 solid Substances 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 241000700159 Rattus Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/18—Prevention or correction of operating errors
- G08B29/185—Signal analysis techniques for reducing or preventing false alarms or for enhancing the reliability of the system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1895—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for short real-time information, e.g. alarms, notifications, alerts, updates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/50—Connection management for emergency connections
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/12—Checking intermittently signalling or alarm systems
- G08B29/123—Checking intermittently signalling or alarm systems of line circuits
Definitions
- the present disclosure relates to methods and devices in clustered alarm scenarios. More particularly the disclosure pertains to methods and arrangements for detecting several messages of a preconfigured message type, arriving sequentially in time.
- LTE is a technology for realizing high-speed packet-based communication that can reach high data rates both in the downlink and in the uplink, and is thought of as a next generation mobile communication system relative to UMTS.
- LTE allows for a system bandwidth of 20 MHz, or up to 100 MHz when carrier aggregation is employed.
- LTE is also able to operate in different frequency bands and can operate in at least Frequency Division Duplex, FDD and Time Division Duplex, TDD, modes.
- 5G i.e. 5th generation mobile networks
- 5G the main task for 5G is to improve throughput and capacity compared to LTE. This is achieved by increasing the sample rate and bandwidth per carrier. 5G is also focusing on use of higher carrier frequencies i.e. above 5-10 GHz.
- One main object of a 5G radio concept is to support highly reliable ultra-low delay Machine-Type Communication, MTC, i.e., Critical-MTC.
- MTC Machine-Type Communication
- the Critical-MTC concept should address the design trade-offs regarding e.g., end-to-end latency, transmission reliability, system capacity and deployment, and provide solutions for how to design a wireless network for different industrial-application use cases.
- the Critical MTC system should in particular allow for radio resource management that allows the coexistence between different classes of applications: sporadic data, e.g., alert messages, periodic data, and others with e.g. real-time data (or simply best-effort data).
- Alert messages e.g., alarms is probably one important type of messages that needs support for critical MTC application. Alarms are typically rare events. Hence, the alarm may be of Random Access type in some cases while in other cases, where we can assume that wireless device has reasonable sync to the network node, a scheduling request may be used.
- alarms come in clusters. That means, once a sensor is transmitting an alarm it is likely that other sensors may transmit alarms almost at the same time or very short time after the first alarm.
- a simple example of such type of alarm is the temperature/smoke alarm that could simultaneously trigger several closely spaced sensors. The alarms or alerts may come in the order of milliseconds, and then the network might not be able to detect the alarm message(s) with possible fatal problem/failure as a potential cause.
- the system needs to be designed such that rare alarm events may be transmitted with very low latency and detected with high reliability.
- Another approach is to use a high complexity detector algorithm, however using such an algorithm for monitoring rare events may imply that a lot of hardware capacity in the receiving network node, also referred to as message detector, is allocated to the complex detector algorithm instead of serving ordinary cellular traffic in the system, giving reduction in the system capacity, or increased cost for the hardware and/or software in the network node to maintain simultaneously high capacity system and high complexity detector.
- the document US 2013/083648 A1 relates to a method of handling a collision event between a first and second transmission including detecting a collision event between the first and second transmissions while processing the first transmission at a receiver.
- the method further includes halting decoding of the first transmission in response to detecting the collision, adjusting receive parameters to receive the second transmission, and detecting a preamble portion of the second transmission using the adjusted receive parameters.
- the document EP 1 770 923 A2 relates to a method for initializing a wireless network which includes discovering at least one node of the wireless network that is within hearing range of a base station of the wireless network, authenticating the at least one discovered node, assigning a node identifier to the at least one discovered node, and selecting a network frequency, at least one backup frequency, and a locally unique network identifier.
- Digital cellular telecommunications system Phase 2+; Universal Mobile Telecommunications System (UMTS); LTE; Service requirements for Machine-Type Communications (MTC); Stage 1 (3GPP TS 22.368 version 12.4.0 Release 12 ) may also be mentioned as a general background document.
- An object of the present disclosure is to provide a radio network node which seeks to mitigate, alleviate, or eliminate one or more of the above-identified deficiencies in the art and disadvantages singly or in any combination.
- a method performed in a radio network node, of detecting several messages of a preconfigured message type.
- the method comprises detecting a first message of the preconfigured message type, the first message being associated with an event.
- the method further comprises reconfiguring, in the radio network node, in response to the detection, at least one radio setting related to detecting further messages of the preconfigured message type and monitoring a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
- the message type is an alert message or an alarm message; and the reconfiguration involves switching from a first detection method to a second detection method, the second detection method providing, relative to the first detection method, an increased capability of detecting messages of the preconfigured message type by lowering a detection threshold, and/or enabling hardware to increase the detection sensitivity to messages of the preconfigured message type that are overlapping or affected by interference.
- the method further comprises monitoring a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
- the disclosure improves the alert message detection performance in scenarios, where multiple alarms may be triggered at approximately the same time.
- the disclosure improves good trade-off between system capacity, network node complexity and reliability in the communication between the C-MTC devices transmitting the messages and network node is achieved.
- the reconfiguring comprises reconfiguring at least one radio setting during a predefined time period after the detection of the first message.
- the reconfiguring comprises enabling a capability to detect several messages of the preconfigured messages type that are at least partly overlapping in time.
- the radio settings may be reconfigured such that overlapping messages may be received.
- the reconfiguring comprises enabling or disabling one or more hardware units. Hence, overlapping messages or messages affected by interference are not missed. By adding processing or hardware resources, then the error rate may be kept the same.
- the reconfiguring comprises monitoring additional radio resources. If the requests are sent on different channels in time and or frequency, there is no risk for collision.
- the reconfiguring implies changing the false detection rate in the network node.
- the reconfiguring comprises modifying a detection threshold in the radio network node. By lowering a detection threshold, the risk of missing data is reduced. This may be desirable if it is known that new messages are likely to occur within a certain time period. If a detection threshold is decreased, the false-detection rate typically increases.
- the first message is a random access message. According to some aspects, the first message is a scheduling request.
- the method further comprises the step of transmitting a response message to the sender of the first message.
- the method further comprises the step of detecting a further message of the preconfigured message type.
- the method further comprises the step of reverting to at least one of the radio settings used before detecting the first message. A while after the detection of the first message, the probability to receive further messages is decreased. Hence, the network node may then revert to the original settings in order to save (or free up) power or processing resources.
- the disclosure relates to a computer program comprising computer program code which, when executed, causes a radio network node to execute the methods described above and below.
- the disclosure relates a network node, in a wireless communication system.
- the network node is configured to execute the methods described above.
- FIG. 1a is illustrating embodiments of a network, where the proposed methods may be implemented.
- four wireless devices 10a-10d here being sensors, monitor a first production line.
- Each sensor is connected to or integrated with a modem that may communicate with an access point or base station.
- the sensor devices are referred to as user equipments, UE, which is the term used by 3GPP standardization.
- Figure 1b illustrates another example scenario.
- the detectors are located in vicinity of each other, e.g. in a building. If one of the detectors gives an alarm due to e.g. a fire, there is then an increased probability that there will be more alarms in a near future.
- the fire may affect all different kinds of sensors including battery, fire, temperature, smoke, software etc. Hence, at e.g. a fire, many alarms may occur in a very short time period.
- Figure 2a is a time scheme illustrating how alarms from sensors are clustered in time.
- Figure 2b illustrates that colliding alarms at time T2 are not correctly detected.
- the same radio configuration or detection method M1 is used all the time. This configuration is typically power or resource efficient. However, the method cannot be used to detect several overlapping alarms.
- one approach is to use a high complexity detector algorithm.
- a lot of hardware capacity in the receiving network node also referred to as message detector, is allocated to the complex detector algorithm instead of serving ordinary traffic in the system, giving reduction in the system capacity, or increased cost for the hardware and/or software in the network node to maintain simultaneously high capacity system and high complexity detector.
- the basic concept of the disclosure is to dynamically adapt or adjust the radio capabilities of an alert message detector 20 based on the likelihood of receiving alarms. This concept is using the fact that, in some scenarios, once a first alarm is detected the likelihood for alarms or alerts from other sensors are high, the alert message detector is adapted for improved performance. Then, the high performance detection mode is only used when there is a high probability to receive messages, wherein overall power consumption is reduced.
- the detector algorithm is adapted to a more complex detector, for instance a detector capable of detecting multiple alert messages transmitted at the same frequency/time resources, here referred to as a joint detector.
- more hardware resources e.g. processors, are allocated to the detector.
- the adaptation of the detector is in a typical embodiment made during a pre-determined time period after a first alarm is detected. Hence, by enabling extra resources the risk of missing alarms may be reduced during certain time periods.
- Figure 2c illustrates detecting colliding alarms using the proposed methods.
- the detector uses a default detection method, M1. This method is typically quite power efficient, but not so efficient in terms of handling overlap and/or interference.
- M2 detection method M2 is e.g. capable of detecting several simultaneous alarms. Hence, alarms overlapping in time, at T2, are correctly detected.
- the alarm or alert message may be a message transmitted rather seldom. Hence, it may in some embodiments use random access channels and in other embodiments scheduling requests. However, the disclosure is not limited to these kinds of channels, but covers other channels with similar irregular occurrence, and where similar alert messages may be transmitted from associated sensors/modems etc. in a short time frame after a first sensor triggered an alert message.
- Figures 3 and 4 comprises some operations and modules which are illustrated with a solid border and some operations which are illustrated with a dashed border.
- the operations and modules which are illustrated with solid border are operations which are comprised in the broadest example embodiment.
- the operations and modules which are illustrated with dashed border are example embodiments which may be comprised in, or a part of, or are further embodiments which may be taken in addition to the operations and modules of the broader example embodiments. It should be appreciated that the operations need not be performed in order.
- FIG. 4 illustrates an example network node, configured for detecting several messages of a preconfigured message type.
- the network node in this application also referred to as detector or alert message detector, is typically a radio network node or base station, such as an eNodeB in LTE.
- the network node 20 comprises radio communication interface 21, a network communication interface 22 and processing circuitry 23.
- the radio communication interface 21 is configured for communication with wireless devices within reach of the network node over a radio communication technology.
- the radio communication interface 21 is adapted to receive messages of the predetermined message type, i.e. alarms or alert messages.
- the network communication interface 22 is configured for communication with other network nodes. This communication is often wired e.g. using fiber. However, it may as well be wireless.
- the connection between network nodes is generally referred to as the backhaul.
- the controller, CTL, or processing circuitry 23 may be constituted by any suitable Central Processing Unit, CPU, microcontroller, Digital Signal Processor, DSP, etc. capable of executing computer program code.
- the computer program may be stored in a memory, MEM 24.
- the memory 24 can be any combination of a Read And write Memory, RAM, and a Read Only Memory, ROM.
- the memory 24 may also comprise persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, or solid state memory or even remotely mounted memory.
- the disclosure relates to a computer program comprising computer program code which, when executed, causes a radio network node to execute the methods described above and below.
- the processing circuitry 23 is configured to perform the proposed methods of detecting several messages of a preconfigured message type. Hence, the processing circuitry 23 is configured to detect a first message of the preconfigured message type, the first message being associated with an event and to reconfigure, in the radio network node, in response to the detection, at least one radio setting related to detecting further messages of the preconfigured message type. The processing circuitry 23 is further configured to monitor a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
- an alert message detector 20 e.g. an eNodeB
- the alert message detector is using a configuration referred to as a first detection method M1.
- the monitoring is made using a first detection method M1.
- the first detection method corresponds e.g. to a detector capable of only detecting a single alert message at a first frequency/time resource(s) or a detector with a first false alarm detection rate or a detector using a first set of hardware units.
- the first detection method could also be a combination thereof.
- the proposed method comprises in a first step S1, detecting a first message of the preconfigured message type, wherein the first message is associated with an event.
- the message is received from a first wireless device.
- the message is detected using the first detection method.
- the message type is e.g. an alert message or alarm message.
- PAM MTC Feature Priority Alarm Message
- 3GPP 3GPP
- the message is associated with an event implying e.g. that it is triggered or caused by an event.
- An event is something that happens at a given place and time. An event may occur sporadically.
- the event is e.g. a sensor alarm.
- One example is an alarm from a sensor being triggered to send a message of a preconfigured message type under certain conditions.
- Alarms triggered by sensors that are somehow related typically occur within a short time period as shown in figure 2a to 2c .
- One example of related sensors is fire and/or smoke sensors in a building. Events may also be alarms or indications of software updates, low battery level or temperature increase or decrease.
- the network node 20 may comprise a detector module 231 configured to detect the first message.
- the method further comprises the step of transmitting S2 a response message to the sender of the first message.
- the scheduler transmits an uplink, UL, grant to the sensor/device associated with the detected alert message.
- the network node 20 may comprise a detector module 232 configured to transmit a response message.
- the method comprises reconfiguring S3, in the radio network node, in response to the detection S1, at least one radio setting related to detecting further messages of the preconfigured message type.
- the network node now adapts the alert message detection method and monitors the uplink for alert messages using a second detection method, M2.
- the network node 20 may comprise a reconfiguration module 233 configured to reconfigure the radio settings.
- the reconfiguring S3 comprises enabling a capability to detect several messages of the preconfigured messages type that are at least partly overlapping in time.
- the second detection method comprises e.g. using a detector capable to detect multiple alert messages at a first frequency and/or time resource simultaneously, i.e. a joint detector.
- the reconfiguring comprises enabling or disabling one or more hardware units such as processor units, receivers or receive antennas.
- the reconfiguring comprises monitoring additional radio resources in time and/or frequency.
- the reconfiguring implies changing the false detection rate in the network node.
- This may be implemented by modifying a detection threshold in the radio network node.
- the detection threshold is e.g. defined as a number of errors per message that are allowed, while still considering a message being correctly detected.
- One example is using a detector with a second false alarm detection rate, which is higher than the first false alarm rate, but which detector is less likely to miss messages, even if they are partly or completely overlapping.
- Another example is using a detector using a second set of hardware units which is larger than the first set.
- the second detection method may detect messages of the preconfigured message type even if there is interference or overlap.
- the method further comprises monitoring S4 a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
- Using the reconfigured radio settings implies a decreased risk of missing messages of the preconfigured message type, because resources for e.g. simultaneous detection are introduced.
- the network node 20 may comprise a monitoring module 234 configured to monitor a radio spectrum for further messages.
- the method further comprises the step of detecting S5 a further message of the preconfigured message type.
- the further message may be triggered by the same event as the first message or of a related message.
- alarms are less likely to be missed.
- every time a new alert message being a random access message or a request for uplink resources is detected uplink grants are transmitted to the sensors/devices associated with the detected alarm message.
- the reconfiguring comprises reconfiguring at least one radio setting during a predefined time period after the detection of the first message. Then a timer is started, when the radio settings are reconfigured. This is in optional embodiments made until the timer is expired when the detector is adapted to the first detection method again.
- the timer may be application specific but typically in the range of seconds to minutes even if the disclosure is not limited to such ranges.
- the method further comprises the step of reverting S6 to at least one of the radio settings used before detecting the first message.
- the functions or steps noted in the blocks can occur out of the order noted in the operational illustrations.
- two blocks shown in succession can in fact be executed substantially concurrently or the blocks can sometimes be executed in the reverse order, depending upon the functionality/acts involved.
- the functions or steps noted in the blocks can according to some aspects of the disclosure be executed continuously in a loop.
- a cell is associated with a radio node, where a radio node or radio network node or eNodeB used interchangeably in the example embodiment description, comprises in a general sense any node transmitting radio signals used for measurements, e.g., eNodeB, macro/micro/pico base station, home eNodeB, relay, discovery signal device, access node/point, or repeater.
- a radio network node herein may comprise a radio network node operating in one or more frequencies or frequency bands. It may be a radio network node capable of CA. It may also be a single- or multi-RAT node.
- a multi-RAT node may comprise a node with co-located RATs or supporting multi-standard radio (MSR) or a mixed radio network node.
- a computer-readable medium may include removable and non-removable storage devices including, but not limited to, Read Only Memory (ROM), Random Access Memory (RAM), compact discs (CDs), digital versatile discs (DVD), etc.
- program modules may include routines, programs, objects, components, data structures, etc. that performs particular tasks or implement particular abstract data types.
- Computer-executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps or processes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Description
- The present disclosure relates to methods and devices in clustered alarm scenarios. More particularly the disclosure pertains to methods and arrangements for detecting several messages of a preconfigured message type, arriving sequentially in time.
- The 3rd Generation Partnership Project, 3GPP, is responsible for the standardization of the Universal Mobile Telecommunication System, UMTS, and Long Term Evolution, LTE. The 3GPP work on LTE is also referred to as Evolved Universal Terrestrial Access Network, E-UTRAN. LTE is a technology for realizing high-speed packet-based communication that can reach high data rates both in the downlink and in the uplink, and is thought of as a next generation mobile communication system relative to UMTS. In order to support high data rates, LTE allows for a system bandwidth of 20 MHz, or up to 100 MHz when carrier aggregation is employed. LTE is also able to operate in different frequency bands and can operate in at least Frequency Division Duplex, FDD and Time Division Duplex, TDD, modes.
- In 5G, i.e. 5th generation mobile networks, there will be evolvement of the current LTE system to 5G. The main task for 5G is to improve throughput and capacity compared to LTE. This is achieved by increasing the sample rate and bandwidth per carrier. 5G is also focusing on use of higher carrier frequencies i.e. above 5-10 GHz.
- One main object of a 5G radio concept is to support highly reliable ultra-low delay Machine-Type Communication, MTC, i.e., Critical-MTC. The Critical-MTC concept should address the design trade-offs regarding e.g., end-to-end latency, transmission reliability, system capacity and deployment, and provide solutions for how to design a wireless network for different industrial-application use cases. The Critical MTC system should in particular allow for radio resource management that allows the coexistence between different classes of applications: sporadic data, e.g., alert messages, periodic data, and others with e.g. real-time data (or simply best-effort data).
- One approach is to mix C-MTC applications with ordinary Mobile Broadband, MBB, traffic on the newly defined 5G. Hence, similar random access procedures as well as scheduling request procedures may be used for C-MTC applications as for MBB service, however with much tighter latency requirements/response times and/or reliability requirements.
- Alert messages e.g., alarms is probably one important type of messages that needs support for critical MTC application. Alarms are typically rare events. Hence, the alarm may be of Random Access type in some cases while in other cases, where we can assume that wireless device has reasonable sync to the network node, a scheduling request may be used.
- In many automation scenarios it might be likely that alarms come in clusters. That means, once a sensor is transmitting an alarm it is likely that other sensors may transmit alarms almost at the same time or very short time after the first alarm. A simple example of such type of alarm is the temperature/smoke alarm that could simultaneously trigger several closely spaced sensors. The alarms or alerts may come in the order of milliseconds, and then the network might not be able to detect the alarm message(s) with possible fatal problem/failure as a potential cause.
- In any case, the system needs to be designed such that rare alarm events may be transmitted with very low latency and detected with high reliability.
- One simple prior art solution for avoiding such risk for collisions is to allocate separate frequency/time resources for random access/scheduling request to all sensors sufficiently often in order to fulfill the latency requirements. However with that approach significantly amount of resources need to be pre-allocated that typically would not be used and hence very low system capacity is achieved.
- Another approach is to use a high complexity detector algorithm, however using such an algorithm for monitoring rare events may imply that a lot of hardware capacity in the receiving network node, also referred to as message detector, is allocated to the complex detector algorithm instead of serving ordinary cellular traffic in the system, giving reduction in the system capacity, or increased cost for the hardware and/or software in the network node to maintain simultaneously high capacity system and high complexity detector.
- The document
US 5828300 A is considered the closest prior art. The preambles of the independent claims are based on this document. It discloses a self-testing data communications system suitable for use with an alarm system, the communications system being capable of modifying an operational parameter such as the input signal sensitivity of a receiver located at a monitoring station during receipt of a supervision signal from a remote alarm device, in order to ensure that a non-supervision alarm signal will be properly received when the operational parameter is again returned to its normal state. It does not concern clustered alarm situations. - The document
US 2013/083648 A1 relates to a method of handling a collision event between a first and second transmission including detecting a collision event between the first and second transmissions while processing the first transmission at a receiver. The method further includes halting decoding of the first transmission in response to detecting the collision, adjusting receive parameters to receive the second transmission, and detecting a preamble portion of the second transmission using the adjusted receive parameters. - The document
EP 1 770 923 A2 relates to a method for initializing a wireless network which includes discovering at least one node of the wireless network that is within hearing range of a base station of the wireless network, authenticating the at least one discovered node, assigning a node identifier to the at least one discovered node, and selecting a network frequency, at least one backup frequency, and a locally unique network identifier. - The 3GPP draft from ZTE, R2-102284, "RACH congestion evaluation and potential solutions" is a general backgound document and discloses several scenarios leading to RACH congestion and some high level proposals to address this problem, for example: Proposal 1: MTC scenarios where RA attempts cannot be uniformly spread in time should be considered and corresponding enhancements should be investigated.
- "Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Service requirements for Machine-Type Communications (MTC); Stage 1 (3GPP TS 22.368 version 12.4.0 Release 12) may also be mentioned as a general background document.
- However, it is desirable being able to handle clustered alarm situations in a good way such that the high reliability detection is maintained at the same time as an acceptable false alarm rate is achieved and complexity of the detector is maintained on an acceptable level.
- The invention is defined in the independent claims. Additional features of the invention are provided in the dependent claims.
- An object of the present disclosure is to provide a radio network node which seeks to mitigate, alleviate, or eliminate one or more of the above-identified deficiencies in the art and disadvantages singly or in any combination.
- This object is achieved by a method, performed in a radio network node, of detecting several messages of a preconfigured message type. The method comprises detecting a first message of the preconfigured message type, the first message being associated with an event. The method further comprises reconfiguring, in the radio network node, in response to the detection, at least one radio setting related to detecting further messages of the preconfigured message type and monitoring a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
- The message type is an alert message or an alarm message; and the reconfiguration involves switching from a first detection method to a second detection method, the second detection method providing, relative to the first detection method, an increased capability of detecting messages of the preconfigured message type by lowering a detection threshold, and/or enabling hardware to increase the detection sensitivity to messages of the preconfigured message type that are overlapping or affected by interference. The method further comprises monitoring a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
- By using reconfigured settings, wherein the reconfiguration increases capability to detect e.g. overlapping messages or messages affected by interference, the risk of missing a further message of the preconfigured message type is avoided. Hence, the disclosure improves the alert message detection performance in scenarios, where multiple alarms may be triggered at approximately the same time. The disclosure improves good trade-off between system capacity, network node complexity and reliability in the communication between the C-MTC devices transmitting the messages and network node is achieved.
- According to some aspects, the reconfiguring comprises reconfiguring at least one radio setting during a predefined time period after the detection of the first message. By changing the settings during a predefined time, messages received during times when it is a "high probability" to receive further messages, the risk of fault detection is reduced.
- According to some aspects, the reconfiguring comprises enabling a capability to detect several messages of the preconfigured messages type that are at least partly overlapping in time. The radio settings may be reconfigured such that overlapping messages may be received. According to some aspects, the reconfiguring comprises enabling or disabling one or more hardware units. Hence, overlapping messages or messages affected by interference are not missed. By adding processing or hardware resources, then the error rate may be kept the same.
- According to some aspects, the reconfiguring comprises monitoring additional radio resources. If the requests are sent on different channels in time and or frequency, there is no risk for collision.
- According to some aspects, the reconfiguring implies changing the false detection rate in the network node. According to some aspects, the reconfiguring comprises modifying a detection threshold in the radio network node. By lowering a detection threshold, the risk of missing data is reduced. This may be desirable if it is known that new messages are likely to occur within a certain time period. If a detection threshold is decreased, the false-detection rate typically increases.
- According to some aspects, the first message is a random access message. According to some aspects, the first message is a scheduling request.
- According to some aspects, the method further comprises the step of transmitting a response message to the sender of the first message. According to some aspects, the method further comprises the step of detecting a further message of the preconfigured message type. According to some aspects, the method further comprises the step of reverting to at least one of the radio settings used before detecting the first message. A while after the detection of the first message, the probability to receive further messages is decreased. Hence, the network node may then revert to the original settings in order to save (or free up) power or processing resources.
- According to some aspects, the disclosure relates to a computer program comprising computer program code which, when executed, causes a radio network node to execute the methods described above and below.
- According to some aspects, the disclosure relates a network node, in a wireless communication system. The network node is configured to execute the methods described above.
- The foregoing will be apparent from the following more particular description of the example embodiments, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the example embodiments.
-
Figure 1a is illustrating embodiments of one network, where the proposed methods may be implemented; -
Figure 1b is illustrating embodiments of another network, where the proposed methods may be implemented; -
Figure 2a illustrates clustered alarms in a time scheme; -
Figure 2b illustrates that colliding alarms are not correctly detected; -
Figure 2c illustrates detecting colliding alarms using the proposed methods; -
Figure 3 is a flowchart illustrating embodiments of method steps in a network node; -
Figure 4 is an example node configuration of a network node, according to some of the example embodiments; - Aspects of the present disclosure will be described more fully hereinafter with reference to the accompanying drawings. The apparatus and method disclosed herein can, however, be realized in many different forms and should not be construed as being limited to the aspects set forth herein. Like numbers in the drawings refer to like elements throughout.
- The terminology used herein is for the purpose of describing particular aspects of the disclosure only, and is not intended to limit the disclosure. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
-
Figure 1a is illustrating embodiments of a network, where the proposed methods may be implemented. In this example, fourwireless devices 10a-10d, here being sensors, monitor a first production line. Each sensor is connected to or integrated with a modem that may communicate with an access point or base station. Hence, from a radio perspective the sensor devices are referred to as user equipments, UE, which is the term used by 3GPP standardization. - This is an example scenario. During a long time, e.g. min/hours/days, no alarms are reported. Suddenly at
time T0 sensor 10a detects a problem, and sends an alarm e.g. including a scheduling request. Thenetwork node 20, here also referred to as an alert message detector, then needs to allocate uplink resources in order for the sensor to report the exact alarm message. However, due to cascading failures and/or problems in the production line, anadjacent sensor 10b triggers an alarm at time T1, and a third and afourth sensor -
Figure 1b illustrates another example scenario. In this example there are four fire/smoke detectors 10a' -10d'. The detectors are located in vicinity of each other, e.g. in a building. If one of the detectors gives an alarm due to e.g. a fire, there is then an increased probability that there will be more alarms in a near future. The fire may affect all different kinds of sensors including battery, fire, temperature, smoke, software etc. Hence, at e.g. a fire, many alarms may occur in a very short time period. -
Figure 2a is a time scheme illustrating how alarms from sensors are clustered in time.Figure 2b illustrates that colliding alarms at time T2 are not correctly detected. In this method the same radio configuration or detection method M1 is used all the time. This configuration is typically power or resource efficient. However, the method cannot be used to detect several overlapping alarms. - As mentioned above, one approach is to use a high complexity detector algorithm. However using such an algorithm for monitoring rare events may imply that a lot of hardware capacity in the receiving network node, also referred to as message detector, is allocated to the complex detector algorithm instead of serving ordinary traffic in the system, giving reduction in the system capacity, or increased cost for the hardware and/or software in the network node to maintain simultaneously high capacity system and high complexity detector.
- The basic concept of the disclosure is to dynamically adapt or adjust the radio capabilities of an
alert message detector 20 based on the likelihood of receiving alarms. This concept is using the fact that, in some scenarios, once a first alarm is detected the likelihood for alarms or alerts from other sensors are high, the alert message detector is adapted for improved performance. Then, the high performance detection mode is only used when there is a high probability to receive messages, wherein overall power consumption is reduced. - In a first example, once a first alarm is reliable detected, the threshold for detection of alert messages are lowered increasing the reliability of detection at the price of also increasing the false alarm rate. In another example the detector algorithm is adapted to a more complex detector, for instance a detector capable of detecting multiple alert messages transmitted at the same frequency/time resources, here referred to as a joint detector. In yet another example more hardware resources e.g. processors, are allocated to the detector. The adaptation of the detector is in a typical embodiment made during a pre-determined time period after a first alarm is detected. Hence, by enabling extra resources the risk of missing alarms may be reduced during certain time periods.
-
Figure 2c illustrates detecting colliding alarms using the proposed methods. As in the example above, the detector uses a default detection method, M1. This method is typically quite power efficient, but not so efficient in terms of handling overlap and/or interference. In this example, once one alarm is detected, the settings of the message detector are reconfigured to detection method M2. Detection method M2 is e.g. capable of detecting several simultaneous alarms. Hence, alarms overlapping in time, at T2, are correctly detected. - In the description below we discuss alarm or alert messages and scheduler action made once an alarm is detected in the network node. The alarm or alert message may be a message transmitted rather seldom. Hence, it may in some embodiments use random access channels and in other embodiments scheduling requests. However, the disclosure is not limited to these kinds of channels, but covers other channels with similar irregular occurrence, and where similar alert messages may be transmitted from associated sensors/modems etc. in a short time frame after a first sensor triggered an alert message.
- The proposed technique will now be described referring to
Figure 3 illustrating example node operations in a network node andFigure 4 illustrating an example node configuration for performing these node operations. - It should be appreciated that
Figures 3 and4 comprises some operations and modules which are illustrated with a solid border and some operations which are illustrated with a dashed border. The operations and modules which are illustrated with solid border are operations which are comprised in the broadest example embodiment. The operations and modules which are illustrated with dashed border are example embodiments which may be comprised in, or a part of, or are further embodiments which may be taken in addition to the operations and modules of the broader example embodiments. It should be appreciated that the operations need not be performed in order. -
Figure 4 illustrates an example network node, configured for detecting several messages of a preconfigured message type. The network node, in this application also referred to as detector or alert message detector, is typically a radio network node or base station, such as an eNodeB in LTE. Thenetwork node 20 comprisesradio communication interface 21, anetwork communication interface 22 andprocessing circuitry 23. - The
radio communication interface 21 is configured for communication with wireless devices within reach of the network node over a radio communication technology. In particular theradio communication interface 21 is adapted to receive messages of the predetermined message type, i.e. alarms or alert messages. - The
network communication interface 22 is configured for communication with other network nodes. This communication is often wired e.g. using fiber. However, it may as well be wireless. The connection between network nodes is generally referred to as the backhaul. - The controller, CTL, or processing
circuitry 23 may be constituted by any suitable Central Processing Unit, CPU, microcontroller, Digital Signal Processor, DSP, etc. capable of executing computer program code. The computer program may be stored in a memory,MEM 24. Thememory 24 can be any combination of a Read And write Memory, RAM, and a Read Only Memory, ROM. Thememory 24 may also comprise persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, or solid state memory or even remotely mounted memory. - According to some aspects, the disclosure relates to a computer program comprising computer program code which, when executed, causes a radio network node to execute the methods described above and below.
- The
processing circuitry 23 is configured to perform the proposed methods of detecting several messages of a preconfigured message type. Hence, theprocessing circuitry 23 is configured to detect a first message of the preconfigured message type, the first message being associated with an event and to reconfigure, in the radio network node, in response to the detection, at least one radio setting related to detecting further messages of the preconfigured message type. Theprocessing circuitry 23 is further configured to monitor a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings. - The proposed methods performed in a
network node 20, here referred to as an alert message detector, will now be described in more detail referring toFigure 3 . It should be appreciated that the example operations ofFigure 3 may be performed simultaneously for any number of radio network nodes in the wireless communications network. - We refer back to the scenarios in
figure 1 . Hence, analert message detector 20, e.g. an eNodeB, is monitoring the uplink, UL, for alert messages. The alert message detector is using a configuration referred to as a first detection method M1. Hence, the monitoring is made using a first detection method M1. The first detection method corresponds e.g. to a detector capable of only detecting a single alert message at a first frequency/time resource(s) or a detector with a first false alarm detection rate or a detector using a first set of hardware units. The first detection method could also be a combination thereof. - The proposed method comprises in a first step S1, detecting a first message of the preconfigured message type, wherein the first message is associated with an event. The message is received from a first wireless device. The message is detected using the first detection method. The message type is e.g. an alert message or alarm message. One example would be a MTC Feature Priority Alarm Message, PAM, defined in 3GPP, which is intended for use with MTC Devices that issue a priority alarm in the event of e.g. theft, vandalism or other needs for immediate attention. However, there may also be other message types defined.
- The message is associated with an event implying e.g. that it is triggered or caused by an event. An event is something that happens at a given place and time. An event may occur sporadically. The event is e.g. a sensor alarm. One example is an alarm from a sensor being triggered to send a message of a preconfigured message type under certain conditions. Alarms triggered by sensors that are somehow related (e.g. located in vicinity) typically occur within a short time period as shown in
figure 2a to 2c . One example of related sensors is fire and/or smoke sensors in a building. Events may also be alarms or indications of software updates, low battery level or temperature increase or decrease. - A sensor that triggers an alarm typically needs uplink resources for sending further information about the event. Hence, the first message is e.g. a random access message or a scheduling request on an uplink control channel as discussed above. The
network node 20 may comprise adetector module 231 configured to detect the first message. - According to some aspects, the method further comprises the step of transmitting S2 a response message to the sender of the first message. Once an alert message being a random access message or a request for uplink resources has been detected the scheduler transmits an uplink, UL, grant to the sensor/device associated with the detected alert message. The
network node 20 may comprise adetector module 232 configured to transmit a response message. - In a next step the method comprises reconfiguring S3, in the radio network node, in response to the detection S1, at least one radio setting related to detecting further messages of the preconfigured message type. Hence, the network node now adapts the alert message detection method and monitors the uplink for alert messages using a second detection method, M2. The
network node 20 may comprise areconfiguration module 233 configured to reconfigure the radio settings. - According to some aspects, the reconfiguring S3 comprises enabling a capability to detect several messages of the preconfigured messages type that are at least partly overlapping in time. Thus, the second detection method comprises e.g. using a detector capable to detect multiple alert messages at a first frequency and/or time resource simultaneously, i.e. a joint detector. According to some aspects, the reconfiguring comprises enabling or disabling one or more hardware units such as processor units, receivers or receive antennas.
- According to some aspects, the reconfiguring comprises monitoring additional radio resources in time and/or frequency.
- According to some aspects, the reconfiguring implies changing the false detection rate in the network node. This may be implemented by modifying a detection threshold in the radio network node. The detection threshold is e.g. defined as a number of errors per message that are allowed, while still considering a message being correctly detected. One example is using a detector with a second false alarm detection rate, which is higher than the first false alarm rate, but which detector is less likely to miss messages, even if they are partly or completely overlapping. Another example is using a detector using a second set of hardware units which is larger than the first set. Hence, the second detection method may detect messages of the preconfigured message type even if there is interference or overlap.
- The method further comprises monitoring S4 a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings. Using the reconfigured radio settings implies a decreased risk of missing messages of the preconfigured message type, because resources for e.g. simultaneous detection are introduced. The
network node 20 may comprise amonitoring module 234 configured to monitor a radio spectrum for further messages. - According to some aspects, the method further comprises the step of detecting S5 a further message of the preconfigured message type. The further message may be triggered by the same event as the first message or of a related message. However, by using the reconfigured radio settings, alarms are less likely to be missed. Thus, with the proposed technique, every time a new alert message being a random access message or a request for uplink resources is detected uplink grants are transmitted to the sensors/devices associated with the detected alarm message.
- According to some aspects, the reconfiguring comprises reconfiguring at least one radio setting during a predefined time period after the detection of the first message. Then a timer is started, when the radio settings are reconfigured. This is in optional embodiments made until the timer is expired when the detector is adapted to the first detection method again. The timer may be application specific but typically in the range of seconds to minutes even if the disclosure is not limited to such ranges. Hence, according to some aspects, the method further comprises the step of reverting S6 to at least one of the radio settings used before detecting the first message.
- Aspects of the disclosure are described with reference to the drawings, e.g., block diagrams and/or flowcharts. It is understood that several entities in the drawings, e.g., blocks of the block diagrams, and also combinations of entities in the drawings, can be implemented by computer program instructions, which instructions can be stored in a computer-readable memory, and also loaded onto a computer or other programmable data processing apparatus. Such computer program instructions can be provided to a processor of a general purpose computer, a special purpose computer and/or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer and/or other programmable data processing apparatus, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks.
- In some implementations and according to some aspects of the disclosure, the functions or steps noted in the blocks can occur out of the order noted in the operational illustrations. For example, two blocks shown in succession can in fact be executed substantially concurrently or the blocks can sometimes be executed in the reverse order, depending upon the functionality/acts involved. Also, the functions or steps noted in the blocks can according to some aspects of the disclosure be executed continuously in a loop.
- In the drawings and specification, there have been disclosed exemplary aspects of the disclosure. However, many variations and modifications can be made to these aspects without substantially departing from the principles of the present disclosure. Thus, the disclosure should be regarded as illustrative rather than restrictive, and not as being limited to the particular aspects discussed above. Accordingly, although specific terms are employed, they are used in a generic and descriptive sense only and not for purposes of limitation.
- It should be noted that although terminology from 3GPP LTE has been used herein to explain the example embodiments, this should not be seen as limiting the scope of the example embodiments to only the aforementioned system. Other wireless systems, including WCDMA, WiMax, UMB, GSM, WLAN, and Bluetooth may also benefit from the example embodiments disclosed herein.
- The description of the example embodiments provided herein have been presented for purposes of illustration. The description is not intended to be exhaustive or to limit example embodiments to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of various alternatives to the provided embodiments. The examples discussed herein were chosen and described in order to explain the principles and the nature of various example embodiments and its practical application to enable one skilled in the art to utilize the example embodiments in various manners and with various modifications as are suited to the particular use contemplated. The features of the embodiments described herein may be combined in all possible combinations of methods, apparatus, modules, systems, and computer program products. It should be appreciated that the example embodiments presented herein may be practiced in any combination with each other.
- It should be noted that the word "comprising" does not necessarily exclude the presence of other elements or steps than those listed and the words "a" or "an" preceding an element do not exclude the presence of a plurality of such elements. It should further be noted that any reference signs do not limit the scope of the claims, that the example embodiments may be implemented at least in part by means of both hardware and software, and that several "means", "units" or "devices" may be represented by the same item of hardware.
- A cell is associated with a radio node, where a radio node or radio network node or eNodeB used interchangeably in the example embodiment description, comprises in a general sense any node transmitting radio signals used for measurements, e.g., eNodeB, macro/micro/pico base station, home eNodeB, relay, discovery signal device, access node/point, or repeater. A radio network node herein may comprise a radio network node operating in one or more frequencies or frequency bands. It may be a radio network node capable of CA. It may also be a single- or multi-RAT node. A multi-RAT node may comprise a node with co-located RATs or supporting multi-standard radio (MSR) or a mixed radio network node.
- The various example embodiments described herein are described in the general context of method steps or processes, which may be implemented in one aspect by a computer program product, embodied in a computer-readable medium, including computer-executable instructions, such as program code, executed by computers in networked environments. A computer-readable medium may include removable and non-removable storage devices including, but not limited to, Read Only Memory (ROM), Random Access Memory (RAM), compact discs (CDs), digital versatile discs (DVD), etc. Generally, program modules may include routines, programs, objects, components, data structures, etc. that performs particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps or processes.
- In the drawings and specification, there have been disclosed exemplary embodiments. However, many variations and modifications can be made to these embodiments. Accordingly, although specific terms are employed, they are used in a generic and descriptive sense only and not for purposes of limitation, the scope of the embodiments being defined by the following claims.
Claims (17)
- A method, performed in a radio network node (20), of detecting several messages of a preconfigured message type, the method comprising:- detecting (S1) a first message of the preconfigured message type, the first message being associated with an event; and- reconfiguring (S3), in the radio network node, in response to the detection (S1), at least one radio setting related to detecting further messages of the preconfigured message type, characterized by:the message type being an alert message or an alarm message; andthe reconfiguration involving switching from a first detection method (M1) to a second detection method (M2), the second detection method providing, relative to the first detection method, an increased capability of detecting messages of the preconfigured message type by lowering a detection threshold, and/or enabling hardware to increase the detection sensitivity to messages of the preconfigured message type that are overlapping or affected by interference; and- monitoring (S4) a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
- The method of any preceding claim, wherein the monitoring (S4) comprises using the at least one reconfigured radio setting during a predefined time period after the detection of the first message.
- The method of any preceding claim, wherein the reconfiguring comprises enabling a capability to detect several messages of the preconfigured message type that are at least partly overlapping in time.
- The method of any preceding claim, wherein the reconfiguring comprises enabling or disabling one or more hardware units.
- The method of claim 4, wherein the reconfiguring comprises enabling more receiver branches/antennas.
- The method of any preceding claim, wherein the reconfiguring comprises monitoring additional radio resources.
- The method of any preceding claim, wherein the reconfiguring implies changing the false detection rate in the radio network node.
- The method of claim 7, wherein the reconfiguring comprises modifying a detection threshold in the radio network node.
- The method of any preceding claim, wherein first message is a random access message.
- The method of any preceding claim, wherein first message is a scheduling request.
- The method of any preceding claim further comprising the step of:- transmitting (S2) a response message to the sender of the first message.
- The method of any preceding claim further comprising the step of:- detecting (S5) a further message of the preconfigured message type using the at least one reconfigured radio setting.
- The method of any preceding claim further comprising the step of:- reverting (S6) to at least one of the radio settings used before detecting the first message.
- The method of any preceding claim, wherein the first detection method (M1) is the default detection method, and is more power efficient or less complex than the second detection method (M2).
- A computer program comprising computer program code which, when executed, causes a radio network node to execute all the steps of the method according to any of the claims 1-14.
- A radio network node (20), in a communication system, the radio network node being configured for detecting several messages of a preconfigured message type, the radio network node (20) comprising :- a radio communication interface (21);- a network communication interface (22) configured for communication with other radio network nodes, and- processing circuitry (23) configured to cause the radio network node (20):• to detect a first message of the preconfigured message type, the first message being associated with an event;• to reconfigure, in the radio network node, in response to the detection, at least one radio setting related to detecting further messages of the same preconfigured message type; characterized by:• the message type being an alert message or an alarm message; and the reconfiguration involving switching from a first detection method (M1) to a second detection method (M2), the second detection method providing, relative to the first detection method, an increased capability of detecting messages of the preconfigured message type by lowering a detection threshold, and/or enabling hardware to increase the detection sensitivity to messages of the preconfigured message type that are overlapping or affected by interference;
and• to monitor a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings. - The radio network node (20) of claim 16, wherein the processing circuitry (23) is further configured to cause the radio network node (20) to perform any of the steps as defined in claims 2-14.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2015/051972 WO2016119893A1 (en) | 2015-01-30 | 2015-01-30 | Methods and arrangements for alert message detection in low latency systems |
Publications (2)
Publication Number | Publication Date |
---|---|
EP3251287A1 EP3251287A1 (en) | 2017-12-06 |
EP3251287B1 true EP3251287B1 (en) | 2020-03-04 |
Family
ID=52477773
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP15704968.5A Active EP3251287B1 (en) | 2015-01-30 | 2015-01-30 | Methods and arrangements for alert message detection in low latency systems |
Country Status (4)
Country | Link |
---|---|
US (1) | US10297142B2 (en) |
EP (1) | EP3251287B1 (en) |
CN (1) | CN107210922B (en) |
WO (1) | WO2016119893A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110687254B (en) | 2019-10-14 | 2021-11-05 | 浙江大华技术股份有限公司 | Method and system for determining diffusion trend of diffusible object |
US11610391B2 (en) | 2019-12-30 | 2023-03-21 | Industrial Technology Research Institute | Cross-domain image comparison method and system using semantic segmentation |
EP3885926A1 (en) * | 2020-03-25 | 2021-09-29 | Carrier Corporation | Fire protection system |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6087933A (en) * | 1996-05-20 | 2000-07-11 | Pittway Corporation | Antenna switching for amplitude degradation during supervision and installation of wireless security systems |
US5828300A (en) * | 1996-05-20 | 1998-10-27 | Pittway Corporation | Alarm system with supervision controlled receiver parameter modification |
EP1296276A1 (en) * | 2001-09-21 | 2003-03-26 | EM Microelectronic-Marin SA | Method of controlling the receiver of a long distance communication transponder |
US7091827B2 (en) * | 2003-02-03 | 2006-08-15 | Ingrid, Inc. | Communications control in a security system |
US7831282B2 (en) * | 2003-10-15 | 2010-11-09 | Eaton Corporation | Wireless node providing improved battery power consumption and system employing the same |
US7426190B2 (en) | 2005-09-30 | 2008-09-16 | Robert Bosch Gmbh | System and method for a communication protocol for wireless sensor systems including systems with high priority asynchronous message and low priority synchronous message |
US8260249B2 (en) * | 2007-09-17 | 2012-09-04 | Qualcomm Incorporated | Method and apparatus of power control for a public warning system |
CN102223688B (en) * | 2010-04-16 | 2016-04-13 | 中兴通讯股份有限公司 | A kind of method and system processing the preferential alert message of MTC |
WO2011136508A2 (en) * | 2010-04-27 | 2011-11-03 | Ajou University Industry-Academic Cooperation Foundation | Random access method and apparatus in wireless communication system |
CN102256218A (en) * | 2010-05-21 | 2011-11-23 | 电信科学技术研究院 | Transmission method and device for preferential warning message in machine type communication |
CN102413448B (en) * | 2010-09-25 | 2016-06-08 | 中兴通讯股份有限公司 | MTC device sends carrying establishing method and the system of preferential alarm data |
JP5569322B2 (en) * | 2010-10-07 | 2014-08-13 | ソニー株式会社 | Wireless terminal, wireless communication method, and wireless communication system |
US9013975B2 (en) * | 2011-09-30 | 2015-04-21 | Silicon Laboratories Inc. | Receiver with collision detection and method therefor |
JP6112116B2 (en) * | 2012-02-17 | 2017-04-12 | 日本電気株式会社 | Method for controlling machine type communication (MTC) in a wireless communication network |
US8909267B2 (en) * | 2012-04-19 | 2014-12-09 | Telefonaktiebolaget L M Ericsson (Publ) | Energy-efficient detection of network connection requests |
-
2015
- 2015-01-30 CN CN201580074765.2A patent/CN107210922B/en active Active
- 2015-01-30 US US15/547,096 patent/US10297142B2/en active Active
- 2015-01-30 EP EP15704968.5A patent/EP3251287B1/en active Active
- 2015-01-30 WO PCT/EP2015/051972 patent/WO2016119893A1/en active Application Filing
Non-Patent Citations (1)
Title |
---|
None * |
Also Published As
Publication number | Publication date |
---|---|
US10297142B2 (en) | 2019-05-21 |
EP3251287A1 (en) | 2017-12-06 |
CN107210922B (en) | 2020-09-25 |
CN107210922A (en) | 2017-09-26 |
US20180025622A1 (en) | 2018-01-25 |
WO2016119893A1 (en) | 2016-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9578645B2 (en) | Reducing congestion in wireless communication networks | |
JP6440720B2 (en) | D2D communication method and apparatus | |
EP2719242B1 (en) | Unscheduled messages | |
JP6196373B2 (en) | System information signaling to MTC device | |
US10177898B2 (en) | Methods for signal detection in a system with sparse synchronization signal rate | |
EP3251287B1 (en) | Methods and arrangements for alert message detection in low latency systems | |
EP2839710A2 (en) | Method and communication device for controlling access to a wireless access network | |
EP4305914A1 (en) | Techniques for dual active subscriber transmit sharing | |
EP4059270B1 (en) | Always-on short messages | |
WO2020143827A1 (en) | Method and apparatus for transmitting control information | |
WO2021051219A1 (en) | Techniques for prioritizing manually search public land mobile network | |
CN113383604A (en) | Timer configuration for new radio unlicensed and new radio shared spectrum | |
US20180027448A1 (en) | Methods and Arrangements for Enabling Uplink Radio Access in Clustered Alarm Scenarios | |
US11832137B2 (en) | Techniques for discontinuous reception collision handling for multiple subscriber identity module user equipment | |
US11758606B2 (en) | Suspension of beam or link recovery for a failure event | |
EP4211982A1 (en) | Techniques for discontinuous reception collision resolution for multi-sim user equipment | |
US11950251B2 (en) | Configured grant based physical uplink shared channel transmission with associated scheduling request | |
WO2021217387A1 (en) | Recovery from repeated network configuration failure | |
EP4124140A1 (en) | User equipment and base station involved in transmission of small data | |
US20230179337A1 (en) | Hybrid automatic repeat request (harq) feedback operation with sidelink unlicensed | |
WO2021067817A1 (en) | Dynamic indication of physical downlink control channel monitoring location | |
WO2022192905A1 (en) | Techniques for dual active subscriber transmit sharing | |
WO2023156124A1 (en) | Suspending random-access procedure | |
EP4176525A2 (en) | Beam failure detection and recovery with carrier aggregation | |
WO2020205242A1 (en) | Reporting uplink control information in a random access procedure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20170821 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20180828 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 12/18 20060101AFI20191014BHEP Ipc: H04W 76/50 20180101ALI20191014BHEP Ipc: G08B 29/12 20060101ALN20191014BHEP |
|
INTG | Intention to grant announced |
Effective date: 20191120 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 12/18 20060101AFI20191111BHEP Ipc: H04W 76/50 20180101ALI20191111BHEP Ipc: G08B 29/12 20060101ALN20191111BHEP |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: ASHRAF, SHEHZAD, ALI Inventor name: BALDEMAIR, ROBERT Inventor name: LINDOFF, BENGT Inventor name: LINDQVIST, FREDRIK |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 1241660 Country of ref document: AT Kind code of ref document: T Effective date: 20200315 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602015048100 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200604 Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20200304 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200605 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200604 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200704 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200729 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 1241660 Country of ref document: AT Kind code of ref document: T Effective date: 20200304 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602015048100 Country of ref document: DE |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
26N | No opposition filed |
Effective date: 20201207 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210130 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20210131 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210131 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210131 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210130 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210131 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20230125 Year of fee payment: 9 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20230127 Year of fee payment: 9 Ref country code: DE Payment date: 20230127 Year of fee payment: 9 |
|
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230523 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20150130 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |